Tuesday, January 5, 2010

Happy New Year!

It's New Year's Resolution time - have you made yours yet?

Some of us will hit the gym, others may quit smoking, but according to surveys 92% of Americans fail to obtain their goals throughout the year and almost half of them fail within the first month!

Have you ever thought about resolving your computer network issues for the New Year? I've included an article below to alert you to some of the threats that may be attacking your network as well as a FREE 27-Point Problem Prevention Audit offer to ensure that your network is as secure as possible. Having a secure network is an easy resolution to make and keep when you have a company like ThinkTech  that will take care of it for you...


Top 4 Threats Attacking Your Network And What To Do About Them


 #1 Overconfidence
User overconfidence in security products is the top threat to your network.  Failure to "practice safe software" results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle keyloggers that steal passwords.  Surveys promising free stuff, result in theft of information like your mother's maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data.  Think before you click!

#2 Social Networking Sites
Social networking sites like Facebook are exploding in popularity.  Threats range from malware (eg. viruses, worms, spyware) to scammers trying to steal your identity, information and money.  Many businesses and government agencies are using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable.  Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies.  We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network access.

#3 Attacks On Mobile Devices
Everyone is going mobile these days not just the "road warriors."  Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month.  Mobile devices often contain sensitive data yet they are easily lost or stolen.  Be sure to password protect and encrypt data on all mobile devices whenever possible.  Include mobile devices in your acceptable use policy.

#4 Cloud Computing
"The Cloud," in its most simple form, involves using the Internet to access and store your data.  When you access email using a web browser, you are working in "the cloud."  Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning.  Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet.  You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.


Want More Information?


If you'd like to take advantage of our FREE 27-Point Problem Prevention Audit call us at 508-992-2541. Your Audit will include:


  • -  A check on your networks security against hackers and viruses
  • -  Verification of network backups to make sure they are working properly
  • -  Recommendations to make your systems run more smoothly
  • -  Initial network documentation that is yours to KEEP

So call us and schedule your FREE 27-Point Problem Prevention Audit today!

508-992-2541



No comments:

Post a Comment